Latest Posts

Three trend analysis techniques

There are three types of trend analysis that I have used in the past to predict the future: geographic, temporal, and intuitive. I describe these three in the introduction to my Seven Trends in Networking and Security pitch.

November 19, 2007 by Richard Stiennon

Comments

Brand jealousy, Scoble has it bad

The Scobleizer vents his frustration with the Apple Brand Juggernaut in his post today. He seems upset that Mac users are so vehement in defense of Apple products.

November 17, 2007 by Richard Stiennon

7 Comments

Chinese threat is a threat

I have to quote Lewis Page of the Register on this: A US government panel specially created to warn of danger from China has warned of danger from China. The panel, The US-China Economic and Security Review Commission (USCC), just published a 56 page document that they reported to congress last June.

November 16, 2007 by Richard Stiennon

6 Comments

Insiders, you gotta watch 'em

It is a pretty common theme of my Cyber Crime Scenario presentation that insiders are a risk. The more so because markets for data, especially credit card info, are making it possible for just about anay knowledge worker with access to data to rob you.

November 12, 2007 by Richard Stiennon

Comments

Hushmail betrays trust of users

One likes to think that a secure web based email provider would be able to secure your email. It is becoming more and more evident that there truly is a threat against your private communications.

November 8, 2007 by Richard Stiennon

8 Comments

DHS has some house keeping to do

The office of the Inspector General of the Department of Homeland Security has issued a 41 page report on how the department is progressing on security. Summary findings:Systems are being accredited without key documents or missing key information.

October 19, 2007 by Richard Stiennon

Comments